Essays about: "Förfalskning"
Showing result 1 - 5 of 8 essays containing the word Förfalskning.
-
1. Identification of Monoclonal Antibodies:Peptide Mass Fingerprinting (PMF) with Matrix Assisted Laser Desorption/Ionization (MALDI), Time of Flight (ToF), Mass Spectrometry (MS) and Protein Peptide Mapping (PPM) with Capillary Electrophoresis (CE)
University essay from KTH/ProteinvetenskapAbstract : Antalet monoklonala antikroppar som används i läkemedel ökar kraftigt. Dessa läkemedel är dyra och risken för förfalskning är stor. Behovet att utveckla en metod för snabb och precis identifiering av monoklonala antikroppar är därför brådskande. READ MORE
-
2. Demonstration of Digital Selective Call spoofing
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Digital Selective Calling (DSC) is a vital maritime communications and safety system, enabling ships in distress to alert nearby vessels and coast guard stations of their emergency. While DSC is suitable for calling, its technical format is substandard from a cybersecurity perspective. READ MORE
-
3. Distributed Relay/Replay Attacks on GNSS Signals
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In modern society, Global Navigation Satellite Systems (GNSSs) are ubiquitously relied upon by many systems, among others in critical infrastructure, for navigation and time synchronization. To overcome the prevailing vulnerable state of civilian GNSSs, many detection schemes for different attack types (i.e. READ MORE
-
4. Exploring Ethical Hacking by Identifying Vulnerabilities in Motorola BabyMonitor MBP855CONNECT(4855)
University essay from KTH/Medicinteknik och hälsosystemAbstract : As IoT is implemented into more of our daily-use devices, so too should the understanding of potential risks caused by interconnectivity. Securing an IoT device is no simple feat, it is therefore important to understand the complexities of cyber security. READ MORE
-
5. A Comparison of Smartphone GPSL1 and Galileo E1-B/C Spoofing Resilience
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Location-based services have grown in importance as smartphones, and location-based applications have become an integral part of everyday life. While Global Navigation Satellite Systems (GNSSs) provide the most accurate position determination, open service GNSS signals remain unprotected and susceptible to spoofing attacks. READ MORE